Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.2.241

A Secure Protocol for Contents Service in IMT-2000  

Lee, Deok-Gyu (순천향대학교 대학원 전산학과)
Lee, Im-Yeong (순천향대학교 정보기술공학부)
Abstract
IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information. However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 Project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and certification issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 certification method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.
Keywords
IMT-2000; Offered Contents; Mutual Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 3GPP TS 33.102, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G Security security Architecture.'
2 3GPP TS 22.022, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; Personalisation of UMTS Mobile Equipment (ME) ; Mobile functionality specification.'
3 3GPP TS 33.103, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; integration Guidelines.'
4 3GPP TS 33.105, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; Cryptographic Algorithm Requirements.'
5 3GPP TS 33.120, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; Security Principles and Objectives.'
6 3G TR 33.908, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; General Report on the Design, Specification and Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms.'
7 ESTI SAGE, 'Specification of the MILENAGE Algorithm Set : an Example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, $f1^*$, f2, f3, f4, f5, and $f5^*$,' Document 1 : Algorithm Specification
8 3G TR 33.901, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; Criteria for cryptographic algorithm design process.'
9 3G TR 33.902, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; Formal Analysis of the 3G Authentication Protocol.'
10 ESTI SAGE, 'Specification of the MILENAGE Algorithm Set : an Example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, $f1^*$, f2, f3, f4, f5, and $f5^*$,' Document 2 : Implementors' Test Data
11 ETSI SAGE, 'Security Algorithm Group of Experts(SAGE) ; General Report Design, Specification adn Evaluation of the MILENAGE Algorithm Set : An Example Algorithm Set for the 3GPP Authentication and Key Generation Functions.'
12 ESTI SAGE, 'Specification of the MILENAGE Algorithm Set : an Example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, $f1^*$, f2, f3, f4, f5, and $f5^*$,' Documents 3 : Design Conformance Test Data
13 ITU : ITU-R SECURITY PRINCIPLES FOR INTERNATIONAL MOBILE : TELECOMMUNICATIONS-2000 (IMT-2000) Recommandation ITU-R M.1078
14 ITU : EVALUATION OF SECURITY MECHANISMS FOR IMT-2000 : RECOMMENDATION ITU-R M.1223
15 '정보통신 표준화 백서', 정보통신부, 2000
16 정원영, 정 욱, 'IMT-2000 보안 위협 및 대책', 1999